{"api_version":"1","generated_at":"2026-04-23T06:20:46+00:00","cve":"CVE-2022-23501","urls":{"html":"https://cve.report/CVE-2022-23501","api":"https://cve.report/api/cve/CVE-2022-23501.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-23501","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-23501"},"summary":{"title":"CVE-2022-23501","description":"TYPO3 is an open source PHP based web content management system. In versions prior to 8.7.49, 9.5.38, 10.4.33, 11.5.20, and 12.1.1 TYPO3 is vulnerable to Improper Authentication. Restricting frontend login to specific users, organized in different storage folders (partitions), can be bypassed. A potential attacker might use this ambiguity in usernames to get access to a different account - however, credentials must be known to the adversary. This issue is patched in versions 8.7.49 ELTS, 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-12-14 08:15:00","updated_at":"2023-11-07 03:44:00"},"problem_types":["CWE-287"],"metrics":[],"references":[{"url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-jfp7-79g7-89rf","name":"https://github.com/TYPO3/typo3/security/advisories/GHSA-jfp7-79g7-89rf","refsource":"MISC","tags":[],"title":"Weak Authentication in Frontend Login · Advisory · TYPO3/typo3 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-23501","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23501","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"23501","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"typo3","cpe5":"typo3","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-23501","qid":"691011","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for typo3 (d9e154c9-7de9-11ed-adca-080027d3a315)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-23501","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"TYPO3 is an open source PHP based web content management system. In versions prior to 8.7.49, 9.5.38, 10.4.33, 11.5.20, and 12.1.1 TYPO3 is vulnerable to Improper Authentication. Restricting frontend login to specific users, organized in different storage folders (partitions), can be bypassed. A potential attacker might use this ambiguity in usernames to get access to a different account - however, credentials must be known to the adversary. This issue is patched in versions 8.7.49 ELTS, 9.5.38 ELTS, 10.4.33, 11.5.20, 12.1.1."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-287: Improper Authentication","cweId":"CWE-287"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"TYPO3","product":{"product_data":[{"product_name":"typo3","version":{"version_data":[{"version_value":">= 8.0.0, < 8.7.49","version_affected":"="},{"version_value":">= 9.0.0, < 9.5.38","version_affected":"="},{"version_value":">= 10.0.0, < 10.4.33","version_affected":"="},{"version_value":">= 11.0.0, < 11.5.20","version_affected":"="},{"version_value":">= 12.0.0, < 12.1.1","version_affected":"="}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/TYPO3/typo3/security/advisories/GHSA-jfp7-79g7-89rf","refsource":"MISC","name":"https://github.com/TYPO3/typo3/security/advisories/GHSA-jfp7-79g7-89rf"}]},"source":{"advisory":"GHSA-jfp7-79g7-89rf","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2022-12-14 08:15:00","lastModifiedDate":"2023-11-07 03:44:00","problem_types":["CWE-287"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"11.5.20","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.0","versionEndExcluding":"10.4.33","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.5.38","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionStartIncluding":"12.0.0","versionEndExcluding":"12.1.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*","versionEndExcluding":"8.7.49","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"23501","Ordinal":"226334","Title":"CVE-2022-23501","CVE":"CVE-2022-23501","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"23501","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}